API for flash controller opens realm of custom application

This article discusses the many applications accessible through Hyperstone Application Programming Interface (API). Users now have the option to supplement dedicated NAND flash management firmware from Hyperstone with their own Customer Firmware Extension (CFE) developed with the API.

Hyperstone have earned the reputation of providing the market with the most robust embedded storage solution by implementing proprietary Intellectual Property (IP) and patented techniques to manage the flash memory. Its flash management firmware is the cornerstone of its expertise, and the guarantee for long-term support for new flashes. With the addition of an Application Programming Interface (API) layer, and its unique offer among all flash memory controllers, Hyperstone now becomes a system solution enabler.

The API increases the realm of possibilities, by allowing customers to use world class Hyperstone Flash Management firmware and develop a customer specific firmware build, whether it is to add security or safety features, or to add interface to sensors, or communication interfaces for example. The ultimate goal is to integrate key differentiators. The developing party fully controls the ownership of the Customer Firmware Extension (CFE) and therefore protects its own IP. The CFE is completely independent of the firmware, and as such, can be reused on new generations of flash memories but also on different controllers, an assurance for the same long-term support.

As described in figure 1, API is another brick added to an already extensive set of advanced features to enhance the safety, reliability, endurance and performance of the latest generation of NAND flash memories, including 3D-NAND, and to enable maintenance and diagnostic required in the most demanding applications.

The API provides access to embedded firmware features and additional interfaces (figure 2) through the host interface in order to implement customized application added-value features, enabling a level of differentiation driven solely by the user’s own expertise in the specific market to be tackled. The customer retains full control of his added functional features. The code can be changed at individual convenience, and never needs to be disclosed to Hyperstone.

The CFE becomes part of the final firmware code and is integrated alongside flash management advanced features. A majority of them are executed in the background and are transparent to the user. Those are associated with the safety, the endurance and the performance of the flash memories. These are the results of Hyperstone expertise to bring out the best of each generation of flash memories (SLC, pSLC, MLC, TLC, 3D-NAND).

The user binary can be written or updated by simple data write commands (prefixed by a vendor command that unlocks access to the reserved address range). As such, the customer code is also maintained under the same flash data management procedures (Wear Levelling, Error Correction, etc). If the customer data is moved, it will be handled by the flash translation layer (FTL) which translates logical to physical accesses. By means of call back functions, customers can intercept for example read or write commands, and add own routines. Also for example, based on vendor commands, users can establish communication between any kind of application software running on the host system with either the controller basic firmware (e.g. SMART) or certain of its hardware resources (e.g. AES, SPI, I2C or ISO7816) as well as tunnelling commands through the controller to a connected device such as a smartIC via the ISO7816 UART or a WLAN baseband. As an example, the CFE can have access to a range of features of Hyperstone advanced flash firmware, allowing it to easily manage its own private data outside the commonly user-accessible address space of a storage device.

As the customer binary is not dependent on the flash type used, the API program indeed only needs to be developed once and the same program can be used also if the flash type or Hyperstone controller changes. This way the system can always run with the latest flash technology, but without any additional development effort. Hyperstone firmware and the CFE work in osmosis (figure 3). Hyperstone brings all its expertise in the flash management firmware, and will update it to support any new or changed technology, directly benefiting from its close relationship with the flash manufacturers. Complementarily, the CFE is the result of the customer expertise in its field of application. Both work hand-in-hand, but are completely independent from each other, hence providing a full flexibility. API serves several of our customers’ needs: it enables new applications, strengthens them in their domain of expertise, creates differentiation features against one another, facilitates new feature development without being limited by Hyperstone resources, and enables new firmware feature development.

It would be impossible to list the number of applications that can be addressed with the API. However, hot topics are certainly secure storage and secure transactions. For example, certain applications require a dedicated proprietary firmware in order to utilize the ISO 7816 or SPI interface, to implement encryption key management, and to communicate securely and reliably with a host application. This includes: secure storage, mobile payment, mobile Pay TV, secure mobile communication (data/voice), digital rights management (DRM) (conditional access, license management, content protection), data privacy (e.g. medical), FIDO U2F security key (anti-phishing protection/built-in smart card) with AES data encryption, authentication and IoT for wearables. In addition, other serial interfaces available on Hyperstone controllers can be enabled and made accessible for applications. Behind the scenes, the CFE is stored as binary code in a reserved range not presented to the host (figure 4). This is called the CFE load area. The source code of such CFEs is solely owned and controlled by the customer.

A customer firmware extension (plug-in) binary file, also referenced as CFE, consists of: an authentication section (always located at the beginning of the file), a header section (located directly after the authentication section), and up to three data sections (static, volatile, overlay). This is however transparent to most developers who will not have to worry about it. All firmware extension binaries are encrypted with AES-256 in CBC mode.

To execute API commands through vendor commands, it suffices to register the vendor command in the CFE (either as DataToHostCallBack or DataFromHostCallBack) and to execute the vendor command using the proprietary Hyperstone hsfmt tool, delivered with the kit. The tool is supplied as C source code and can be compiled for different operating systems. Different options exist for debugging, such as using the debug interface of Eclipse or the debug-host via the debug-UART interface. For further information, specific application notes are available. Breakpoints can be set dynamically at runtime. A simple debug possibility is the capability to send (debug) strings with the debug-UART and print them on the host. The key advantages for the API user can be summarized in the following set of added values: full control over application IPs, full control of releases, no synchronization needed with Hyperstone firmware releases, no source code transfer required, unique differentiator through application IPs, and fast software development. The API kit is available for purchase and without recurrent licensing cost including API function support from Hyperstone and firmware field update (FFU).

Different models exist for the development of new applications. The API software development kit (SDK) can be offered to system integrators or end customers directly. It is not required to understand the complex flash management features to develop a CFE. The kit makes it possible for anyone with basic firmware knowledge to develop a new application and implement key differentiators. In some other cases, it is also possible to outsource the tasks to third party software development service providers.

With Hyperstone flash controller API, many applications are imaginable to enhance the value proposition of your system. Security applications can be explained in more detail as an example, one among many others. With API, security features embedded in the Hyperstone controller, like AES encryption engine, SHA engine, secure random number generator can be enabled and managed. It allows the implementation of arbitrary security features and access control systems. In this context, having full ownership of your system is vital. The realm of such applications is limitless, but to mention a few: build own access control system (key management/hashing), build and manage private data space, secure read/write, user key or automatic key generation, encrypted keys, and crypto erase, the fastest way to invalidate data. But the applications do not end here. As a further example, a wireless module can be connected to the flash controller, to get lifetime information, or to save or restore a flash memory image wirelessly.

Hyperstone flash controller API enables the development of dedicated proprietary features through a user-friendly environment, delivered in a kit. Using API, a customer firmware extension can be developed under the strict control of the system integrator, who keeps full ownership of the developed value-added application feature. The serenity of the CFE is also insured as it can be transferred to new generations of flash, without any additional investment. The porting effort across different Hyperstone controllers is minimal. The API is available for S8, U9 and subsequent designs. It has been used for applications now in mass production. Hyperstone will demonstrate the API at Embedded World (Hall 1/Stand 1-301).

Cloud connectivity is a subject that often involves more questions than answers. Do I use public or private cloud services? What public cloud should I use? How do I set up a private cloud? How do I ac...

There is huge potential for touch control technology in the automotive sector but also major challenges to overcome. Before embarking on new designs, engineers need to take these into account. They ne...

In this webinar, we feature the design and development of a field oriented control for a permanent magnet synchronous motor using NXP MagniV microcontroller. The workflow will guide you through model ...

In this video Tektronix explains the features in their latest 5 Series MSO Mixed Signal Oscilloscope. Features include an innovative pinch-swipe-zoom touchscreen user interface, a large high-definitio...

In this video Eric from AVX explains their supercapacitor demonstrator box at APEC 2018 in San Antonio, Texas. The box shows how a 5V 2.5-farad supercapacitor can quickly charge up using harvested ene...

In this video On Semiconductor explains their latest wireless sensor for hazardous environments at APEC in San Antonio, Texas. Intended for applications like high-voltage power cabinets and other plac...

In this video Infineon demonstrates new gate drivers using their LS-SOI technology at APEC 2018. In the demo Victorus, an Infineon application engineer, shows in real time how much better thermal the ...

In this video STMicroelectronics goes over their latest wireless-enabled STM32WB microcontroller for the IoT and intelligent devices in several live connectivity demonstrations at Embedded World 2018....

In this video Infineon goes over their latest wireless charging solutions at the Embedded World show in Nuremberg, Germany. The spokesperson explains the difference between their Qi-compatible solutio...

In this video Mark Hermeling of Grammatech talks to Alix Paultre after the Embedded World show in Nuremberg about the importance of software verification for security and safety in electronic design. ...

In this video Lattice Semiconductor walks us through their booth demonstrations at Embedded World 2018. The live demonstrations include an operating IoT remote vehicle, a low-power network used for vi...

In this video Scott from Maxim Integrated describes their latest security solution at Embedded World 2018. In the live demo he shows the DS28E38 DeepCover Secure ECDSA Authenticator, an ECDSA public k...

In this video John Weber of TechNexion talks to Alix Paultre about how the company helps its customers getting products to market faster. By choosing to work with TechNexion, developers can take advan...

In this video Mike Barr, CEO of the Barr Group, talks to Alix Paultre about cybersecurity at the Embedded World conference in Nuremberg, Germany. Too many designers, even in critical spaces like milit...

Latest Webinars, White Papers & more

Devices which are connected to the Internet must be inherently secure from time of birth. A fundamental first step is to incorporate a Secure Element which store important security information in protected way. Secure Elements need to be pre-programmed, or provisioned, in order to be useful.

During this webinar, you’ll learn how to weigh up the differences between private and public clouds and to use the AE-CLOUD1 kit to quickly interact with one of the currently supported public clouds. We will show how to leverage the Renesas Synergy Platform to establish a secure internet connection.

In this webinar, we will introduce a 80/20 development model with ADLINK’s modularized Smart Panel as an embedded building block and go in depth into how to take advantage of the 80/20 development model to cater to specific vertical markets.

This webinar will introduce a groundbreaking low power BLE device from Panasonic Industry, offering years of operation using only a CR2032 Battery for simple, prompt and sound IoT designs. The webinar will show that designing the PAN1760A Series into any IoT device is an easy task.

In this webinar, we feature the design and development of a field oriented control for a permanent magnet synchronous motor using NXP MagniV microcontroller. The workflow will guide you through model simulation using SIL/PIL models.

This white paper introduces the Quicksilver evaluation kit which caters to a diverse array of IoT applications, ranging from home appliances to smart buildings to energy meters. Powered by a Cypress SoC solution, the kit combines IEEE 802.11 a/b/g/n wireless connectivity with an embedded applications processor.

When upgrading your hardware platform to a newer and more powerful CPU with more, faster cores, you expect the application to run faster. In many cases, however this is not the case. In this paper, we examine what causes these performance issues.

In this webinar you will learn about STMicroelectronics' complete software solution for its range of Bluetooth® Low Energy radio transceivers. BlueNRG-Mesh software enables them to form a mesh network.

The smart connectivity of buildings should be central to transformation: but the reality is something else. While the ‘digital building’ has been a multi-heralded concept for some time, implementation is more problematic. This White Paper discusses the challenges and advantages of the digital building and how a major industry initiative is helping with the convergence of disparate control systems to enable the concept.

Do you want scalable, secured memory solutions which allow you to utilize existing flash memory layout to harden system level security without additional hardware? So you should attend this webinar and you will learn more about how SpiStack combines the fast random access and XIP capability of NOR with the density and cost effectiveness of NAND in one small, low-pin-count SPI package.

Due to the high popularity of NFC in the consumer market, demand for NFC applications in automotive has increased. In this webinar you will learn about NFC and its use cases for automotive, NFC Forum's NFC Controller Interface (NCI), NXP's NFC Controller NCx3340 and more...

Flash memories are nowadays a component in many Automotive systems which are safety-critical. Therefore OEMs are starting to demand a new breed of Flash ICs which can support the requirements of functional safety design at the system level better than previous generations of devices.

As an architecture for building complex systems, microservices is gaining significant traction within the development community. The adoption is on the rise, but so are the struggles associated with understanding how to test microservices.

While solder fatigue and wire lift offs have been the main limiting factors for the lifetime of conventional modules, new technologies for assembly and packaging of semiconductors have emerged and new module generations achieve much longer lifetime. This webinar will provide you some guidance for the selection of the most reliable material combination and design of the substrates.

In this webinar you will learn about the advantages and disadvantages of mainboard versus COM modules with customized or modular carriers and what are the pros and cons of an integrated COM system solution vs choosing piece parts from different vendors. We will discuss which solution is in terms of quantity, complexity, project duration and long-term availability.

The world's first cloud for any embedded display via the flatpanel controller offers full connectivity to enable central parameterization and constant monitoring of the operational status of displays. Learn more on how to easily connect displays to the IoT in this white paper.

The data sheet forms the essential basis for the selection of the right resistor. This white paper uses realistic calculation examples to clearly illustrate how a data sheet can be used to choose the appropriate resistor and what information is important.

CodeMeter License Central offers licenses with unit counters and automated processes, which makes pay-per-use models just as simple to handle as permanent or subscription licenses. In this on-demand webinar, we will go through the whole lifecycle from a number of success stories that will get you inspired to the whole set of actions that will get you started.

Today we are entering an era in which machines adapt their behaviour to humans, rather than the other way around. In this webinar you will learn about the latest Human Vision Components and about OKAO, a software which includes ten different sensing technologies related to human recognition.

Silicon carbide (SiC) MOSFETs are making major inroads into solar inverters. But latest-generation SiC MOSFETs have their limitations. This webinar zooms in for a closer look at these drawbacks and puts forward solutions to resolve the issues at hand.

The areas historically served by silicon devices have in recent years been taken over more often by Wide Band Gap Devices. In our virtual conference leading wide band gap companies together with companies from the test & measurement area provide deep insights into designing with GaN and SiC.